Mask Detection Method Based on YOLO-GBC Network

نویسندگان

چکیده

For the problems of inaccurate recognition and high missed detection rate existing mask algorithms in actual scenes, a novel algorithm based on YOLO-GBC network is proposed. Specifically, backbone part, global attention mechanism (GAM) integrated to improve ability extract key information through cross-latitude interaction. The cross-layer cascade method adopted feature pyramid structure achieve effective bidirectional cross-scale connection weighted fusion. sampling content-aware reassembly features (CARAFE) into fully retain semantic map. NMS replaced with Soft-NMS model prediction frame accuracy by confidence decay method. experimental results show that average (mAP) reached 91.2% data set, which 2.3% higher than baseline YOLOv5, speed 64FPS. recall have also been improved varying degrees, increasing task correctly wearing masks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Complex-YOLO: Real-time 3D Object Detection on Point Clouds

Lidar based 3D object detection is inevitable for autonomous driving, because it directly links to environmental understanding and therefore builds the base for prediction and motion planning. The capacity of inferencing highly sparse 3D data in real-time is an ill-posed problem for lots of other application areas besides automated vehicles, e.g. augmented reality, personal robotics or industri...

متن کامل

Detection Method for Network Penetrating Behavior Based on Communication Fingerprint

In order to monitor the use of network transmission software, the network penetrating technique based on encrypted proxy is discussed. By comparing the behavior of related penetration software, the concept of communication fingerprint is introduced to expand the extension of the communication features. The fingerprints database of encrypted proxy software with specific characteristics is constr...

متن کامل

A Network Anomaly Detection Method Based on Transduction Scheme

Network anomaly detection has been an active and difficult research topic in the field of intrusion detection for many years. Up to now, high false alarm rate, requirement of high quality data for modeling the normal patterns and the deterioration of detection rate because of some “noisy” data in the training set still make it not perform as well as expected in practice. This paper presents a n...

متن کامل

An Entropy-Based Network Anomaly Detection Method

Data mining is an interdisciplinary subfield of computer science involving methods at the intersection of artificial intelligence, machine learning and statistics. One of the data mining tasks is anomaly detection which is the analysis of large quantities of data to identify items, events or observations which do not conform to an expected pattern. Anomaly detection is applicable in a variety o...

متن کامل

Islanding Detection Method of Distributed Generation Based on Wavenet

Due to the increasing need to distributed energy resources in power systems, their problems should be studied. One of the main problem of distributed energy resources is unplanned islanding. The unplanned islanding has some dangers to the power systems and the repairman which are works with the incorrect devices. In this paper, a passive local method is proposed. The proposed method is based on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2023

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics12020408